
The Malware Museum
Mikko Hypponen
The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation or messages that you had been infected.
Share This Collection
eye
Title
Date Archived
Creator
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 7 reviews )
favoritefavoritefavoritefavoritefavorite ( 7 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 6 reviews )
favoritefavoritefavoritefavorite ( 6 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavorite ( 3 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 2 reviews )
( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
Topics: Virus, History, Malware
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
Topics: Virus, History, Malware
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
favoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
( 1 reviews )
Malware Example: JERSCARE.COM *JERSCARE.COM - upon invocation, JerusalemScare (tm) becomes resident. After a short period of time - about a minute on most systems - Jerusa- lemScare will effect the characteristic Jerusalem virus system slowdown and scrolling black window effect on the left side of the monitor.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
Malware Example: DENSCARE.COM *DENSCARE.COM - upon invocation, DenZukoScare (tm) immediately displays the popular DEN ZUK virus graphic effect and exits.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
favoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
This paper will discuss methods viruses use or might use in the future to attack anti-virus programs. Attacks of this kind are becoming more common, as virus writers seem to be constantly looking for ways to make their viruses more efficient and vigorous. This paper also suggests how to make antivirus products more resistant against such attacks. The scope of this paper is limited to PC compatible machines
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
favoritefavoritefavoritefavorite ( 1 reviews )
Fetching more results

DESCRIPTION
The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation or messages that you had been infected.Through the use of emulations, and additionally removing any destructive routines within the viruses, this collection allows you to experience virus infection of decades ago with safety.
Collection Info
- Addeddate
- 2016-02-05 03:32:35
- Collection
- softwarehistory
software
- Creator
- Mikko Hypponen
- Identifier
- malwaremuseum
- Mediatype
- collection
- Publicdate
- 2016-02-05 03:32:35
- Title
- The Malware Museum
Created on
February 5
2016
2016
Jason Scott
Archivist
Archivist
ITEMS
Total Items 87 (Older Stats)
TOP REGIONS (LAST 30 DAYS)
(data not available)